From patchwork Sun Nov 5 16:51:33 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vasily Averin X-Patchwork-Id: 834386 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3yVMDy0MmCz9t38 for ; Mon, 6 Nov 2017 03:52:34 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751550AbdKEQvj (ORCPT ); Sun, 5 Nov 2017 11:51:39 -0500 Received: from mailhub.sw.ru ([195.214.232.25]:17260 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751747AbdKEQvi (ORCPT ); Sun, 5 Nov 2017 11:51:38 -0500 Received: from [172.16.24.21] (msk-vpn.virtuozzo.com [195.214.232.6]) by relay.sw.ru (8.13.4/8.13.4) with ESMTP id vA5GpX8W009526; Sun, 5 Nov 2017 19:51:33 +0300 (MSK) From: Vasily Averin Subject: [PATCH v2 17/21] hashlimit: exit_net cleanup check added To: netdev@vger.kernel.org Cc: coreteam@netfilter.org, netfilter-devel@vger.kernel.org, Florian Westphal , Jozsef Kadlecsik , Pablo Neira Ayuso References: Message-ID: <2ab3017e-9462-148b-a59d-36382ef1721f@virtuozzo.com> Date: Sun, 5 Nov 2017 19:51:33 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Be sure that htables array initialized in net_init hook was return to initial state. Signed-off-by: Vasily Averin --- net/netfilter/xt_hashlimit.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/netfilter/xt_hashlimit.c b/net/netfilter/xt_hashlimit.c index 5da8746..abef6b4 100644 --- a/net/netfilter/xt_hashlimit.c +++ b/net/netfilter/xt_hashlimit.c @@ -1338,7 +1338,11 @@ static int __net_init hashlimit_net_init(struct net *net) static void __net_exit hashlimit_net_exit(struct net *net) { + struct hashlimit_net *hashlimit_net = hashlimit_pernet(net); + hashlimit_proc_net_exit(net); + WARN(!hlist_empty(&hashlimit_net->htables), + "%s: htables hlist is not empty\n", __func__); } static struct pernet_operations hashlimit_net_ops = {